ABSTRACT

In this chapter we describe three methods of attack that represent journalist risk. Under all three methods the simple re-identification risk metric for journalist risk is the same.

Method of Attack 1 Under this method of attack the adversary will start from the disclosed data set and select a record to re-identify. The adversary does not care which record, although he will choose strategically. The most likely records to be re-identified are those in the smallest equivalence classes in the disclosed data set. Therefore the adversary would randomly select one of those records.